Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
暂无分享,去创建一个
[1] Samuel B. Griffith. The Chinese People's Liberation Army , 1968 .
[2] Juan Andres Guerrero-Saade. WALKING IN YOUR ENEMY’S SHADOW: WHEN FOURTH-PARTY COLLECTION BECOMES ATTRIBUTION HELL , 2017 .
[3] Göran Rossholm,et al. Languages of Art , 1998 .
[4] B. Buchanan,et al. Attributing Cyber Attacks , 2015 .
[5] Matt Pietrek,et al. Peering Inside the PE: A Tour of the Win32 Portable Executable File Format , 1994 .
[6] I. Borogan,et al. The New Nobility , 2010 .
[7] Boundless Informant : the NSA ' s secret tool to track global surveillance data , .
[8] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .
[9] J. Alex Halderman,et al. A Search Engine Backed by Internet-Wide Scanning , 2015, CCS.
[10] D. A. Petkus. Ethics of Human Intelligence Operations: Of MICE and Men , 2010 .
[11] Juan Andrés Guerrero-Saade. THE ETHICS AND PERILS OF APT RESEARCH: AN UNEXPECTED TRANSITION INTO INTELLIGENCE BROKERAGE , 2015 .
[12] Tim Weiner,et al. Legacy of Ashes: The History of the CIA , 2007 .
[13] Emil Vassev,et al. Use Cases , 2010, Encyclopedia of Software Engineering.
[14] Michael T. Flynn,et al. Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan , 2010 .
[15] M. Schmitt. The Netherlands releases a Tour de Force on international law in cyberspace: analysis , 2019 .
[16] Sergio Caltagirone,et al. The Diamond Model of Intrusion Analysis , 2013 .
[17] Brian Bartholomew,et al. WAVE YOUR FALSE FLAGS ! DECEPTION TACTICS MUDDYING ATTRIBUTION IN TARGETED ATTACKS , 2016 .
[18] William Howlett Iv. The Rise of China's Hacking Culture: Defining Chinese Hackers , 2016 .